2015
DOI: 10.1080/07418825.2015.1046393
|View full text |Cite
|
Sign up to set email alerts
|

Criminal Careers in Cyberspace: Examining Website Failure within Child Exploitation Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 73 publications
0
10
0
1
Order By: Relevance
“…Yet, while government and non-government agencies, together with multinational corporations (e.g. Google), have been successful in reducing the availability and accessibility of CEM on open access areas of the internet (Ward, 2013; Westlake & Bouchard, 2016), CEM remains ‘endemic’ (Brennan & Hammond, 2016, p. 2) and ‘extremely accessible’ (Chertoff & Simon, 2015, p. 5) in popular online spaces. These include peer-to-peer (P2P) file-sharing networks (Brennan & Hammond, 2016; Wolak, Liberatore, & Levine, 2013) – where unsolicited opportunities to view CEM can be provided (see Prichard, Spiranovic, Watters, & Lueg, 2013, p. 996) – and adult pornography websites (Fortin, Paquette, & Dupont, 2018, p. 35; Ray, Kimonis, & Seto, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…Yet, while government and non-government agencies, together with multinational corporations (e.g. Google), have been successful in reducing the availability and accessibility of CEM on open access areas of the internet (Ward, 2013; Westlake & Bouchard, 2016), CEM remains ‘endemic’ (Brennan & Hammond, 2016, p. 2) and ‘extremely accessible’ (Chertoff & Simon, 2015, p. 5) in popular online spaces. These include peer-to-peer (P2P) file-sharing networks (Brennan & Hammond, 2016; Wolak, Liberatore, & Levine, 2013) – where unsolicited opportunities to view CEM can be provided (see Prichard, Spiranovic, Watters, & Lueg, 2013, p. 996) – and adult pornography websites (Fortin, Paquette, & Dupont, 2018, p. 35; Ray, Kimonis, & Seto, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…In analyzing CSEM forum members’ online behavior, we build on the criminal career paradigm (Piquero et al, 2003): an analytic approach that breaks down the longitudinal sequence of individual criminal behavior into several distinct dimensions like onset, frequency, duration, and crime mix (Blumstein et al, 1988). Whereas the criminal career paradigm is increasingly being used to examine the criminal trajectories of those who engage in sexual offending (Blokland & Lussier, 2015; Blokland, 2018), up to this date this approach is only sparsely applied to online CSEM offending (Fortin & Proulx, 2019; Westlake & Bouchard, 2015). Westlake and Bouchard (2015) applied the criminal career paradigm at the macro level to identify CSEM websites with the highest survival rate.…”
Section: Different Dimensions Of Forum Members’ Online Activitymentioning
confidence: 99%
“…Whereas the criminal career paradigm is increasingly being used to examine the criminal trajectories of those who engage in sexual offending (Blokland & Lussier, 2015; Blokland, 2018), up to this date this approach is only sparsely applied to online CSEM offending (Fortin & Proulx, 2019; Westlake & Bouchard, 2015). Westlake and Bouchard (2015) applied the criminal career paradigm at the macro level to identify CSEM websites with the highest survival rate. At a micro level, Fortin and Proulx (2019) examined the content of hard disks belonging to males arrested and convicted for collecting CSEM online and distinguished four developmental patterns based on monthly changes in the nature of the depicted abuse and the age of the child victims: a degenerating spiral pattern (37.5% of the sampled collections)—collections showing an increase in the severity of the depicted abuse and a decrease in the children’s age, the sexualized adolescent pattern (20%)—showing an increase in both the severity of the abuse and the victim’s age, a boy/girl-love pattern (20%)—showing a decrease in severity and victim’s age, and a de-escalation pattern (22.5%)—showing a decrease in severity and an increase in the children’s age.…”
Section: Different Dimensions Of Forum Members’ Online Activitymentioning
confidence: 99%
“…It is clear from the literature [25,26,27,28,30,36,47,48,49,50] that online communities play a major role in inspiring, organising, and implementing online crime. Future research needs to focus on how cloud criminals (and/or potential criminals) are able to access the resources they need to undertake a cloud-crimethis will more than likely mean entering spaces of ethical divisiveness, such as the Dark Net or 4chan (or whatever new installment they have access to [e.g., 8chan]).…”
Section: The Role Of 'Communities'mentioning
confidence: 99%
“…Westlake and Bouchard [47] believe that the Internet has affected crime on websites in three main ways. First, in terms of sexual exploitation, social networking sites have been used to groom victims [49,50,51] and have also been used for phishing [2], for the spread of malware [53] and spam [54], and financial institutions' websites are used to acquire private financial information of customers [30].…”
Section: Cyber-crime and Cloud-crimementioning
confidence: 99%